Static task
static1
Behavioral task
behavioral1
Sample
35fedb0d523685fd1c330e00a7fcc5bb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35fedb0d523685fd1c330e00a7fcc5bb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35fedb0d523685fd1c330e00a7fcc5bb_JaffaCakes118
-
Size
80KB
-
MD5
35fedb0d523685fd1c330e00a7fcc5bb
-
SHA1
519cecfec90266b2df79b28ad8e2166a3f8e1110
-
SHA256
9376d2d5739afdb1b0b747bd7772ba47f88fb47acb45657ac42633fad964d9e5
-
SHA512
5b039d76b87c62ca1dea76a63702f9a42d8b216b91deafb25958629e85938e50e66ab982e6bd9fcbf22b930e96a70a61591cb0fff1504bbc3c02f015b488c6a1
-
SSDEEP
1536:G8D5INE7nFxm//mRa1DuoqfbJ4+2ts93/btx:G8tH7B4+8sZTtx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35fedb0d523685fd1c330e00a7fcc5bb_JaffaCakes118
Files
-
35fedb0d523685fd1c330e00a7fcc5bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
1519267a8b6372208041ed8c93d54d2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
winmm
mciSendStringA
wininet
FtpGetFileA
FtpSetCurrentDirectoryA
InternetCloseHandle
InternetConnectA
InternetOpenA
FtpPutFileA
ws2_32
send
recv
htons
inet_addr
inet_ntoa
socket
gethostbyname
WSAStartup
connect
kernel32
InitializeCriticalSection
ExitProcess
Sleep
WideCharToMultiByte
MultiByteToWideChar
MoveFileA
CopyFileA
RemoveDirectoryA
DeleteFileA
SetCurrentDirectoryA
GetCurrentDirectoryA
ExitThread
CreateThread
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
RtlUnwind
OpenProcess
CreateProcessA
GetCurrentProcess
GetModuleFileNameA
WriteFile
CreateFileA
GetProcAddress
GetModuleHandleA
GetLocalTime
GetLogicalDriveStringsA
GlobalMemoryStatus
GetComputerNameA
WaitForSingleObject
GetLocaleInfoA
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CompareStringA
CompareStringW
TerminateProcess
GetLastError
SetEnvironmentVariableA
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
SwapMouseButton
ExitWindowsEx
gdi32
GetDeviceCaps
CreateCompatibleDC
DeleteDC
CreateDIBSection
SelectObject
BitBlt
GetDIBColorTable
DeleteObject
CreateDCA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
shell32
CommandLineToArgvW
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ